Your browser is no longer supported

Microsoft has ended support for the browser (or browser mode) you are using. SHI is ending support for all browsers older than IE9.
More information can be found on our website and from Microsoft.

Your browser is no longer supported

Microsoft has ended support for the browser (or browser mode) you are using. SHI is ending support for all
browsers older than IE9 to ensure we can provide the best experience to our customers.
Please work with your IT department to upgrade your software.

The Check Point 5600 appliance combines the comprehensive security protections to safeguard your mid-size enterprise and branch office deployments. The 5600 is a 1U appliance with one I/O expansion slot for higher port capacity, an extensive hard drive. This powerful security appliance is optimized to deliver real-world threat prevention to secure your critical assets and environments.

Key Points

Comprehensive threat prevention

The rapid growth of malware, growing attacker sophistication and the rise of unknown zero-day threats require a different approach to keep enterprise networks and data secure. Check Point delivers fully integrated, comprehensive Threat Prevention with SandBlast Threat Emulation and Threat Extraction for complete protection against the sophisticated threats and zero-day vulnerabilities.

Prevent known and zero-day threats

The 5600 appliance protects organizations from both known and unknown threats with antivirus, anti-bot, SandBlast Threat Emulation (sandboxing), and SandBlast Threat Extraction technologies.

Inspect encrypted connections

There is a shift towards more use of HTTPS, SSL and TLS encryption to increase Internet security. At the same time files delivered into the organization over SSL and TLS represent a stealthy attack vector, that bypasses traditional security implementations. Check Point Threat Prevention looks inside encrypted SSL and TLS tunnels to detect threats, ensuring users remain in compliance with company policies, while surfing the Internet and using corporate data.

Inspect encrypted connectionsThere is a shift towards more use of HTTPS, SSL and TLS encryption to increase Internet security. At the same time files delivered into the organization over SSL and TLS represent a stealthy attack vector, that bypasses traditional security implementations. Check Point Threat Prevention looks inside encrypted SSL and TLS tunnels to detect threats, ensuring users remain in compliance with company policies, while surfing the Internet and using corporate data.